fhe-attack-replay
Copyright 2026 Vaultbytes (Bader Alissaei)

This product includes software developed by Vaultbytes
(https://github.com/BAder82t/fhe-attack-replay).

This software replays published FHE attacks for regression-testing purposes.
The original attack constructions are the work of their respective authors.
Each attack module cites the source paper and any reference PoC repository.
Replay implementations are written from public descriptions and are licensed
under the Apache License, Version 2.0; the cited works retain their own
authorship and license.

Cited works (non-exhaustive; see src/fhe_attack_replay/attacks/*.py for
canonical citations and BibTeX-style references):

  - Cheon, J. H., Hong, S., Kim, D. — "Attacks Against the IND-CPA-D
    Security of Exact FHE Schemes." IACR ePrint 2024/127.
    https://eprint.iacr.org/2024/127

  - Aydin, F., Karabulut, E., et al. — "RevEAL: Single-Trace
    Side-Channel Leakage of the SEAL Homomorphic Encryption Library."
    DATE 2022. IACR ePrint 2023/1128.

  - "Side Channel Analysis in Homomorphic Encryption."
    IACR ePrint 2025/867.
    https://eprint.iacr.org/2025/867

  - Guo, Q., et al. — "Key Recovery Attacks on Approximate
    Homomorphic Encryption with Non-Worst-Case Noise Flooding
    Countermeasures." USENIX Security 2024.

  - Mankali, A., et al. — "GlitchFHE." USENIX Security 2025.

No part of this distribution redistributes the original PoC source code
of the cited works. Reference implementations, where bundled, are clearly
marked and carry their upstream license headers.
